Abstract

A methodology for the design of network security based on the ISO 7498-2 security architecture is defined. The methodology enforces a problem-centered approach by explicitly defining separate specification, design, and implementation phases. In the specification phase, design constraints are identified and the required services are determined. In the design phase, the services are placed within the security architecture, the service primitives are defined, and the underlying service mechanisms and protocols are designed. In the implementation phase, a hardware and software solution is developed, the system is tested and verified, and required accreditation and certification are obtained. The methodology is illustrated by considering an application for an imaginary company. General conclusions regarding the feasibility of defining a network security methodology are presented. >

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.